About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Microsoft 365 Still Weakest Link as Healthcare Email Breaches Continue on Pace With 2024, New Paubox Report Warns

New analysis reveals cybercriminals increasingly exploiting world's most popular business email platform, with 107 healthcare incidents in seven months

Cybercriminals are increasingly targeting Microsoft 365 environments, with the world's most widely-used business email platform now accounting for 52% of all healthcare email breaches—a dramatic surge from 43% just one year ago.

The alarming trend is detailed in Paubox's newly released report, “2025 mid-year email breach data reveals there’s no slowing down”, which analyzed 107 email-related healthcare data breaches that occurred in the first half of 2025. The findings reveal that healthcare organizations using Microsoft 365 face mounting security challenges as attackers refine their tactics to exploit the platform's widespread adoption.

More than 1.6 million patient records were compromised across all incidents, with the average breach exposing nearly 16,000 individual records. The largest single breach—affecting United Seating and Mobility—exposed over half a million records, while the financial impact has reached unprecedented levels, with healthcare breaches now costing an average of $11 million per incident according to IBM's latest research.

"Healthcare IT leaders are confident in their systems, until a breach happens," said Rick Kuwahara, Chief Compliance Officer at Paubox. "What we're seeing is a perfect storm of limited resources, expanding attack surfaces, and security strategies that rely too heavily on human vigilance."

Microsoft 365 incidents increase dramatically

The sharp rise in Microsoft 365 breaches represents a 21% increase year-over-year, suggesting that cybercriminals are becoming more sophisticated in their approach to the platform that serves hundreds of millions of users worldwide. This trend is particularly concerning given Microsoft's dominant position in healthcare IT infrastructure.

Even some premium email security solutions aren't preventing breaches, the report notes, citing incidents involving Mimecast (8%), Proofpoint (6%), and Barracuda (5%) customers. "The inclusion of these platforms suggests that setup, maintenance, and enforcement are more important than the brand name you buy."

Call for fundamental change

Traditional approaches to email security are failing. With 79% of breached organizations having ineffective DMARC protection—up dramatically from 65% in 2024—it's clear that many healthcare organizations are still not implementing basic email authentication measures.

"You don't need to choose between security and usability," Kuwahara emphasized. "A thorough risk analysis and proactive security updates cost a lot less than a breach."

The data shows that 41% of healthcare organizations are now classified as high-risk, compared to just 31% last year—a troubling trend that suggests the problem is getting worse, not better.

As healthcare organizations grapple with these mounting challenges, the report stresses that email security can no longer be treated as a checkbox exercise. With cyberattacks now cited as the leading cause of critical workflow disruptions by 50% of organizations, the cost of inaction has never been clearer.

Human factor remains the biggest gap

The report reveals that 81% of healthcare email breaches were classified as hacking or IT incidents, with credential compromise and phishing attacks dominating the threat landscape. Alarmingly, IT leaders estimate that only 5% of known phishing attacks are actually reported by employees to security teams.

Staff frustration with security protocols is creating dangerous workarounds. A recent survey found that 41% of healthcare providers admitted their teams had bypassed secure messaging at least once in the past year, prioritizing productivity over security—a decision that can have catastrophic consequences.

The financial stakes have never been higher. According to IBM's 2025 Cost of a Data Breach Report, healthcare breaches now cost an average of $11 million per incident, making it the most expensive industry for data breaches for the 14th consecutive year.

Third-party vendors create invisible risk

Business associates—including billing vendors, imaging firms, and outsourced IT providers—were involved in 17 of the 107 email-related breaches, representing 16% of all incidents. These third-party relationships often create blind spots that organizations don't discover until it's too late.

The Episource breach, which affected 5.4 million individuals after the company was acquired by Optum (a UnitedHealth Group subsidiary), exemplifies how deeply embedded business associates can be. Many healthcare providers may not have even realized their patient data was connected to Episource through the broader UnitedHealth network, illustrating how invisible these third-party relationships can remain until a breach occurs.

Download the complete report at https://hubs.la/Q03GBH5R0

Healthcare IT leaders are confident in their systems, until a breach happens. What we're seeing is a perfect storm of limited resources, expanding attack surfaces, and security strategies that rely too heavily on human vigilance.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.